🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide: Automating Access Revocation for Terminations and Transfers — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Practical step-by-step guidance to automate deactivation and removal of access for terminated or transferred personnel to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PS.L2-3.9.2 compliance.

April 19, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to implement, test, and operate an automated access revocation workflow to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control PS.L2-3.9.2 (automating revocation of access for terminations and transfers) within the Compliance Framework environment, giving concrete steps, technical examples, and low-cost approaches suitable for small businesses.

Implementation overview — map the identity lifecycle to Compliance Framework requirements

Start by documenting the identity lifecycle in your Compliance Framework: hire/onboard, role changes/transfers, and termination/offboarding. PS.L2-3.9.2 requires that access is deactivated or removed when personnel leave or change roles. Translate that into an automated workflow that triggers from your authoritative HR system (the single source of truth), executes identity and entitlement changes in your identity provider (IdP) and target systems, and records audit evidence. Key components: (1) HR event source (Workday, BambooHR, ADHR feed), (2) orchestration layer (ServiceNow, Azure Logic Apps, AWS Lambda, or a small automation engine), (3) IdP and provisioning connectors (Okta, Azure AD SCIM, Google Workspace API), (4) target applications (VPN, AWS, GCP, on-prem AD, MDM), and (5) centralized logging for evidentiary records.

Practical integration: HR ➜ Orchestration ➜ Identity provider

Implement a canonical HR-to-IdP integration: when HR marks an employee as "terminated" or changes job role to one with reduced privileges, that event emits a webhook or places a record on a queue. The orchestration component consumes the event and performs a deterministic set of actions based on templates for "termination" and "transfer." Use SCIM where available to change account status and group membership automatically. Example: Workday sends a webhook to an Azure Function which calls Microsoft Graph to set account Enabled=false and calls Okta's API to deactivate the user and remove application assignments. For organizations without Workday, use a nightly CSV export or a ticket created in ServiceNow by HR as the trigger. Document the mapping of HR fields to entitlement templates in your Compliance Framework documentation.

Technical revocation steps and commands (concrete examples)

Design the orchestration to perform both immediate and follow-up actions. Immediate actions (within minutes): disable SSO sessions, revoke tokens, disable AD/Azure AD accounts, remove user from privileged groups, delete or rotate API keys, and disable VPN and cloud console access. Examples of API calls and commands you can script: - Microsoft Graph: POST /users/{id}/revokeSignInSessions or call invalidateAllRefreshTokens via Microsoft Graph to force re-authentication and invalidate sessions. - Azure AD PowerShell: Disable-AzureADUser -ObjectId or Set-MgUser -AccountEnabled:$false (Graph SDK). - Okta API: POST /api/v1/users/{id}/lifecycle/deactivate then DELETE /api/v1/users/{id} (if policy dictates). - AWS: aws iam delete-access-key --user-name --access-key-id ; remove IAM policies or unlink role mappings in IAM Identity Center. Ensure you also remove AWS console federations and active sessions by rotating keys and invalidating tokens where applicable. - VPN/Firewall appliances: use vendor APIs (e.g., Palo Alto, Fortinet) to delete or disable user objects. - MDM (Intune, Jamf): retire or wipe corporate devices, unregister device from MDM to prevent cached credentials from being reused. Also revoke SSH keys held in central key stores and remove entries from authorized_keys on jump servers. Log every API response and persist a signed audit record to your SIEM or cloud storage for compliance evidence.</p>

Small-business scenario: implementing automation on a shoestring

Example: a 50-person small business running Office 365 (Azure AD), Okta for SSO to SaaS apps, AWS for infrastructure, and Jamf for Macs. Implementation steps: 1) Use BambooHR (or even Google Sheets) as the HR source with a simple webhook to an AWS Lambda. 2) Lambda runs a playbook: call Azure AD Graph to disable the account, call Okta to deactivate and remove app assignments, use AWS CLI (running in a secure Lambda role) to delete access keys and remove IAM policies, and call Jamf API to wipe corporate devices. 3) Send a ticket to ServiceNow for human verification and to trigger hardware reclamation. 4) Write logs to CloudWatch and forward them to a SIEM (splunk/elastic) with a retention policy matching Compliance Framework evidence requirements. This approach keeps costs low using serverless functions and leverages existing SaaS API endpoints; it also satisfies PS.L2-3.9.2 by ensuring a repeatable, auditable revocation workflow.

Compliance tips and best practices

Adopt these best practices to satisfy Compliance Framework expectations and make the workflow resilient: - Disable-first, delete-later: immediately disable access for speed, then delete after retention and legal hold checks. - Entitlement templates: maintain role-based entitlement profiles so transfers map to reduced-or-increased access automatically. - Test and stage: run termination simulations in a non-production environment to validate all connectors and fallback procedures. - Orphan detection: schedule periodic scans for accounts that are active but not in HR and create automated tickets or quarantines. - Privileged accounts: require multi-step deprovisioning with approval and ensure privileged sessions are monitored and recorded until disabled. - Logging and immutable evidence: send all revocation actions and API results to a centralized, tamper-evident store with access controls, and keep logs per your Compliance Framework retention policy. - Incident response link: integrate with HR and IR playbooks so suspected malicious departures trigger accelerated revocation and forensic captures.

Risk of not automating or poorly implemented revocation

Failure to implement automated, reliable revocation creates several real risks: ex-employees or transferred staff retain access leading to data exfiltration, accidental or malicious misuse, and lateral movement; audits will find inadequate controls resulting in failed assessments, loss of contracts, and potential regulatory penalties; manual processes are slow and error-prone, increasing mean time to revoke (MTR) and giving threat actors time to act. For small businesses, a single retained privileged account can lead to compromise of intellectual property or CUI, and compromise of upstream contractor trust.

Automating access revocation for terminations and transfers is a concrete, testable control that reduces risk and demonstrates compliance with PS.L2-3.9.2. Start by defining authoritative triggers in HR, building a small orchestration layer that uses SCIM/IdP and vendor APIs, and bake in logging, testing, and escalation. For small businesses, serverless automation plus SaaS IdP connectors deliver an affordable, auditable solution that meets Compliance Framework requirements and materially lowers insider and credential risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes